Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0732: Command Injection in D-Link DI-8200G

0
Medium
VulnerabilityCVE-2026-0732cvecve-2026-0732
Published: Thu Jan 08 2026 (01/08/2026, 23:32:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-8200G

Description

A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 01/08/2026, 23:56:01 UTC

Technical Analysis

CVE-2026-0732 is a command injection vulnerability identified in the D-Link DI-8200G router firmware version 17.12.20A1. The vulnerability resides in an unspecified function within the /upgrade_filter.asp web interface file, where the 'path' parameter is insufficiently sanitized, allowing an attacker to inject and execute arbitrary system commands. This flaw can be exploited remotely without requiring user interaction or prior authentication, making it a significant risk for exposed devices. The vulnerability's CVSS 4.0 score is 5.3 (medium), reflecting its moderate impact and ease of exploitation. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. Although no known exploits in the wild have been reported, the public availability of exploit code increases the likelihood of future attacks. The vulnerability affects only firmware version 17.12.20A1, so devices running other versions may not be vulnerable. The lack of official patches or vendor advisories at the time of publication necessitates immediate defensive measures by users and administrators.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized remote command execution on affected D-Link DI-8200G routers, potentially leading to partial compromise of network devices. Attackers could leverage this flaw to disrupt network availability, intercept or alter network traffic, or use the compromised router as a foothold for lateral movement within internal networks. Critical infrastructure and enterprises relying on these routers for connectivity or security functions may face operational disruptions or data breaches. The medium severity rating suggests that while the impact is not catastrophic, the ease of exploitation and remote attack vector make it a credible threat. Organizations with exposed management interfaces or insufficient network segmentation are particularly vulnerable. Given the public disclosure of exploit code, the risk of targeted attacks against European entities is elevated, especially in sectors with high reliance on D-Link networking hardware.

Mitigation Recommendations

1. Immediately identify and inventory all D-Link DI-8200G devices running firmware version 17.12.20A1 within the network. 2. Disable remote management interfaces and restrict access to the router's web interface to trusted internal IP addresses only. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Monitor network traffic and device logs for unusual commands or access patterns indicative of exploitation attempts. 5. If possible, downgrade to a non-vulnerable firmware version or apply any vendor-provided patches once available. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability or related command injection attempts. 7. Educate network administrators about the vulnerability and enforce strict access controls and password policies on affected devices. 8. Consider replacing affected hardware if patches or mitigations are not feasible in the short term.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-08T15:25:51.430Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696040afecefc3cd7c7366f9

Added to database: 1/8/2026, 11:41:35 PM

Last enriched: 1/8/2026, 11:56:01 PM

Last updated: 1/9/2026, 6:33:39 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats